This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Some Properties of Timed Token Medium Access Protocols
August 1990 (vol. 16 no. 8)
pp. 858-869

Timed-token protocols are used to handle, on the same local area network, both real-time and non-real-time traffic. The authors analyze this type of protocol, giving worst-case values for the throughput of non-real-time traffic and the average token rotation time. Results are obtained for synchronous traffic generated according to a generic periodic pattern under heavy conditions for non-real-time traffic and express not only theoretical lower bounds but values deriving from the analysis of some real networks. A model which addresses the asynchronous overrun problem is presented. The influence of introducing multiple priority classes for non-real-time traffic on the total throughput of this type of message is shown. It is also shown that the differences between the values obtained under worst-case assumptions are close to those obtained under best-case assumptions; the method may therefore be used to provide important guidelines inproperly tuning timed-token protocol parameters for each specific network installation.

[1] N. F. Maxemchuk, "A variation of CSMA/CD that yields movable TDM slots in integrated voice/data local networks,"Bell Syst. Tech. J., vol. 61, no. 7, pp. 1527-1550, Sept. 1982.
[2] J. F. Kurose and M. Schwarz, "A family of window protocols for time constrained applications CSMA networks," inProc. IEEE INFOCOM '83, San Diego, CA, Apr. 1983.
[3] F. A. Tobagi, F. Borgonovo, and L. Fratta, "EXPRESS-NET: A high performance integrated services local area network,"IEEE J. Select. Areas Commun., vol. SAC-1, no. 5, pp. 898-913, Nov. 1983.
[4] J. O. Limb and L. E. Flamm, "A distributed local area network packet protocol for combined voice and data transmission,"IEEE J. Select. Areas Commun., vol. SAC-1, no. 5, pp. 926-934, Nov. 1983.
[5] A. A. Lazar, A. Patir, T. Takahashi, and M. El Zarki, "MAGNET: Columbia's integrated network testbed,"IEEE J. Select. Areas Commun., vol. SAC-3, no. 6, pp. 859-871, Nov. 1985.
[6] F. A. Tobagi, "Multiaccess protocols and real-time communications in local area networks," inProc. Advanced Seminar on Real-Time Local Area Networks, Bandol, France, Apr. 1986, pp. 1-22.
[7] Token Passing Bus Access Method, ANSI/IEEE Std. 802.4-1985, 1985.
[8] International Organization of Standards, ISO DIS 8802/4.
[9] General Motors Corp.,Manufacturing Automation Protocol, version 3.0, implementation release, May 1987.
[10] Draft Proposed ANSI Standard,FDDI Token Ring Media Access Control, ASC X3T9.5/83-16, rev. 10. Feb. 1986.
[11] R. M. Grow, "A timed-token protocol for local area networks," inProc. Electro '82, Paper 17/3, May 1982.
[12] J. N. Ulm, "A timed token ring local area network and its performance characteristics," inProc. 7th Conf. Local Computer Networks, Feb. 1982, pp. 50-56.
[13] K. C. Sevcik and M. J. Johnson, "Cycle time properties of the FDDI token ring protocol,"IEEE Trans. Software Eng., vol. SE-13, no. 3, pp. 376-385, Mar. 1987.
[14] M. J. Johnson, "Proof that timing requirements of the FDDI token ring protocols are satisfied,"IEEE Trans. Commun., vol. COM-35, no. 6, pp. 620-625, June 1987.
[15] D. Dykeman and W. Bux, "Analysis and tuning of the FDDI media access control protocol,"IEEE J. Select. Areas Commun., vol. 6, no. 6, pp. 997-1010, July 1988.
[16] A. P. Jayasumana and G. G. Jayasumana, "Simulation and performance evaluation of IEEE 802.4 priority scheme," inProc. IEEE/ ACM Symp. Simulation of Computer Networks, Aug. 1987, pp. 233- 246.
[17] L. Ciminiera and A. Valenzano, "Acknowledgment and priority mechanisms in IEEE 802.4 token bus,"IEEE Trans. Industrial Electron., vol. IE-35, no. 2, May 1988.
[18] J. W. M. Pang and F. A. Tobagi, "Throughput analysis of a timer-controlled token-passing protocol under heavy load," inProc. INFOCOM '88, New Orleans, LA, Apr. 1988, pp. 796-804.
[19] P. Montuschi, A. Valenzano, and L. Ciminiera, "Requirements for token holding times in timed-token protocols," inProc. Ninth Annu. IEEE Int. Phoenix Conf. Computer and Communications, Scottsdale, AZ, Mar. 1990.

Index Terms:
real-time traffic; timed token medium access protocols; local area network; non-real-time traffic; worst-case values; throughput; average token rotation time; synchronous traffic; generic periodic pattern; heavy conditions; theoretical lower bounds; real networks; asynchronous overrun problem; multiple priority classes; worst-case assumptions; best-case assumptions; timed-token protocol parameters; network installation; electronic messaging; protocols; token networks.
Citation:
A. Valenzano, P. Montuschi, L. Ciminiera, "Some Properties of Timed Token Medium Access Protocols," IEEE Transactions on Software Engineering, vol. 16, no. 8, pp. 858-869, Aug. 1990, doi:10.1109/32.57628
Usage of this product signifies your acceptance of the Terms of Use.